Which of the following IT-related activities is most commonly performed by the second line of defense?
Which of the following physical access controls is most likely to be based on the "something you have" concept?
Which of the following is a primary driver behind the creation and prioritization of new strategic initiatives established by an organization?
Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device’s data or applications?